[1]
Su Liyun and Li Fenglan, Deconvolution of Defocused Image with Multivariate Local Polynomial Regression and Iterative Wiener Filtering in DWT domain, Mathematical Problems in Engineering, vol. 2010, Article ID 605241, 14 pages, 2010.
DOI: 10.1155/2010/605241
Google Scholar
[2]
Su Liyun, Liu Ruihua, Blind Image Restoration with Modified CMA, International Journal of Image and Graphics, 2011, 11(3): 403-413.
DOI: 10.1142/s0219467811004147
Google Scholar
[3]
Su Liyun, Yang Qian, Liu Ruihua, Li Jiaojun, Local Polynomial Modeling in the Application of Image Interpolation, 2011, 1(2):73-76.
Google Scholar
[4]
Liu Ruihua, Su Liyun, Li Fang, Quasi-robust blind deblurring with multiple color images, Applied Mechanics and Materials, 2012, vol.12-126, pp: 1605-1609.
DOI: 10.4028/www.scientific.net/amm.121-126.1605
Google Scholar
[5]
Liu Ruihua, Jia Ruizhi, Su Liyun, Image Decomposition of Partly Noisy Image, Procedia Engineering, 2012, 29:2062-2066.
DOI: 10.1016/j.proeng.2012.01.262
Google Scholar
[6]
Sapwater E, Wood K. Electronic copyright protection, Photo-Electronic Imaging, 1994, 37(6): 16-21
Google Scholar
[7]
Li Fenglan, Su Liyun, Liu Ruihua, and Li Jiaojun, Copyright protection scheme with InF and GFCM in digital library, International Conference on Computer Application and System Modeling, vol. 8, pp.139-143, Taiyuan, Shanxi, China, 2010. Oct. 22-24, 2010.
DOI: 10.1109/iccasm.2010.5619109
Google Scholar
[8]
Su Liyun,Li Fenglan, Li Jiaojun, Chen Bo, A New Covert Image Communication Approach with HVS and GFCM, Advances in Intelligent and Soft Computing, 2009, 62:13-21.
DOI: 10.1007/978-3-642-03664-4_2
Google Scholar
[9]
TANG Shi-fu, MA Hong, SONG En-bin, SU Li-yun. An Adaptive Blind Scheme for Readable Watermark Based on ALE. International Conference on Signal Processing. 2006: 29082-2986.
DOI: 10.1109/icosp.2006.346066
Google Scholar
[10]
PENG,Jian, SU Li-yun,LI Zheng, TANG Shi-fu. A Novel Algorithm of Covert Image Communication with Wavelet Transform and Information Fusion. Fourth International Conference on Image and Graphics,2007,8,22,: 307-312.Imaging, 1994,37(6): 16-21
DOI: 10.1109/icig.2007.109
Google Scholar
[11]
I J Cox, J Kilian, F T Leighton, T Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Trans. on Image Processing, 1997, IP-6(12):1673-1687
DOI: 10.1109/83.650120
Google Scholar
[12]
W Bender, D Gruhl, N Morimoto, A Lu. Techniques for data hiding. IBM System Journal, 1996,35(3&4):313-336.
DOI: 10.1147/sj.353.0313
Google Scholar
[13]
M D Swanson, B Zhu, A H Tewfik, L Boney. Robust audio watermarking using perceptual masking [J]. Signal Processing, 1998 66:337-335
DOI: 10.1016/s0165-1684(98)00014-0
Google Scholar
[14]
SU Li-yun, MA Hong, TANG Shi-fu. Adaptive Image Digital Watermarking with DCT and FCM. Wuhan University Journal of Natural Sciences, 2006, 11(6): 1657-1660.
DOI: 10.1007/bf02831844
Google Scholar
[15]
Su Liyun, Zhang Yuli, Ma Yanju, Li Jiaojun, and Li Fenglan, Multiscale KF Algorithm for Strong Fractional Noise Interference Suppression in Discrete-Time UWB Systems, Discrete Dynamics in Nature and Society, vol. 2011, Article ID356421, 9pages, 2011.
DOI: 10.1155/2011/356421
Google Scholar
[16]
Su Liyun, Li Fenglan, Li Jiaojun, Chen Bo, A Novel Digital Image Covert Communication Scheme based on Generalized FCM in DCT Domain, Fuzzy Information and Engineering, 2011, 3(2):127-136.
DOI: 10.1007/s12543-011-0071-z
Google Scholar
[17]
Zhang Xianda. Modern Signal Processing. Beijing: Publishing House of TUP and Springer, (2002)
Google Scholar
[18]
Zhang Xianda. Communication Signal Processing. Beijing: Publishing House of National Defence Industry, (2000)
Google Scholar